Browse
Assessing Learning
Posted on: #iteachmsu
ASSESSING LEARNING
Technology integration
Technology integration is the use of technology tools in general content areas in education in order to allow students to apply computer and technology skills to learning and problem-solving. Generally speaking, the curriculum drives the use of technology and not vice versa.
Reasons to Incorporate Technology into Your Classroom
Engages students and creates active learners.. Using a computer, tablet, or other device encourages self-directed.
Encourages individual learning and growth.. No one learns in the same way or at the same pace, but technology can..
Facilitates peer collaboration.. In a research project conducted by the U.S. Department of Education, many educators.
Prepares students for the real world.
Technology is an integral part of how we work and live.
The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Reasons to Incorporate Technology into Your Classroom
Engages students and creates active learners.. Using a computer, tablet, or other device encourages self-directed.
Encourages individual learning and growth.. No one learns in the same way or at the same pace, but technology can..
Facilitates peer collaboration.. In a research project conducted by the U.S. Department of Education, many educators.
Prepares students for the real world.
Technology is an integral part of how we work and live.
The availability of appropriate software for the technology being integrated is also problematic in terms of software accessibility to students and educators. Another issue identified with technology integration is the lack of long-range planning for these tools within the educative districts they are being used.
Posted by:
Rupali Jagtap

Posted on: #iteachmsu

Technology integration
Technology integration is the use of technology tools in general co...
Posted by:
ASSESSING LEARNING
Thursday, Sep 23, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
XSLT
Before learning XSLT, we should first understand XSL which stands for EXtensible Stylesheet Language. It is similar to XML as CSS is to HTML.
Need for XSL
In case of HTML document, tags are predefined such as table, div, and span; and the browser knows how to add style to them and display those using CSS styles.
But in case of XML documents, tags are not predefined.
In order to understand and style an XML document, World Wide Web Consortium (W3C) developed XSL which can act as XML based Stylesheet Language. An XSL document specifies how a browser should render an XML document.
4. Following are the main parts of XSL −
XSLT − used to transform XML document into various other types of document.
XPath − used to navigate XML document.
XSL-FO − used to format XML document.
What is XSLT
5. XSLT, Extensible Stylesheet Language Transformations, provides the ability to transform XML data from one format to another automatically.
How XSLT Works
6. An XSLT stylesheet is used to define the transformation rules to be applied on the target XML document. XSLT stylesheet is written in XML format. XSLT Processor takes the XSLT stylesheet and applies the transformation rules on the target XML document and then it generates a formatted document in the form of XML, HTML, or text format. This formatted document is then utilized by XSLT formatter to generate the actual output which is to be displayed to the end-user.
Advantages
Here are the advantages of using XSLT −
Independent of programming. Transformations are written in a separate xsl file which is again an XML document.
Output can be altered by simply modifying the transformations in xsl file. No need to change any code. So Web designers can edit the stylesheet and can see the change in the output quickly.
Need for XSL
In case of HTML document, tags are predefined such as table, div, and span; and the browser knows how to add style to them and display those using CSS styles.
But in case of XML documents, tags are not predefined.
In order to understand and style an XML document, World Wide Web Consortium (W3C) developed XSL which can act as XML based Stylesheet Language. An XSL document specifies how a browser should render an XML document.
4. Following are the main parts of XSL −
XSLT − used to transform XML document into various other types of document.
XPath − used to navigate XML document.
XSL-FO − used to format XML document.
What is XSLT
5. XSLT, Extensible Stylesheet Language Transformations, provides the ability to transform XML data from one format to another automatically.
How XSLT Works
6. An XSLT stylesheet is used to define the transformation rules to be applied on the target XML document. XSLT stylesheet is written in XML format. XSLT Processor takes the XSLT stylesheet and applies the transformation rules on the target XML document and then it generates a formatted document in the form of XML, HTML, or text format. This formatted document is then utilized by XSLT formatter to generate the actual output which is to be displayed to the end-user.
Advantages
Here are the advantages of using XSLT −
Independent of programming. Transformations are written in a separate xsl file which is again an XML document.
Output can be altered by simply modifying the transformations in xsl file. No need to change any code. So Web designers can edit the stylesheet and can see the change in the output quickly.
Authored by:
St.john
Posted on: #iteachmsu
XSLT
Before learning XSLT, we should first understand XSL which stands f...
Authored by:
ASSESSING LEARNING
Thursday, Sep 23, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Encryption is a security method
Encryption is a security method in which information is encoded in such a way that only authorized user can read it. It uses encryption algorithm to generate ciphertext that can only be read if decrypted.
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes.Types of Encryption
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryptionData Encryption is encouraged, as it keeps a company’s data secure and safe from unauthorized hands or in the event of a data breach. For example, if you send an email, you can use encryption technology to convert your mail contents into scrambled data so that no one other than the receiver will understand the mail. 1. Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text.2. Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other.
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes.Types of Encryption
There are two types of encryptions schemes as listed below:
Symmetric Key encryption
Public Key encryptionData Encryption is encouraged, as it keeps a company’s data secure and safe from unauthorized hands or in the event of a data breach. For example, if you send an email, you can use encryption technology to convert your mail contents into scrambled data so that no one other than the receiver will understand the mail. 1. Symmetric key encryption algorithm uses same cryptographic keys for both encryption and decryption of cipher text.2. Public key encryption algorithm uses pair of keys, one of which is a secret key and one of which is public. These two keys are mathematically linked with each other.
Authored by:
Hubert Blaine Wolfeschlegelsteinhausenbergerdorff Sr.Hube...
Posted on: #iteachmsu
Encryption is a security method
Encryption is a security method in which information is encoded in ...
Authored by:
ASSESSING LEARNING
Wednesday, Sep 22, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Health Knowledge
We may think we understand what health is, but is there a single, clear definition? And how has the notion of what is ‘healthy’ changed over time?
It may seem an obvious question: ‘Do you know what “health” means?’ But there is much debate over the definition.
The World Health Organization (WHO) defines health as ‘a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity’. But how accurate is this? Consider a person who has diabetes and manages it with medication, or someone who has back pain that they manage with physiotherapy. These people are clearly not in a state of complete physical wellbeing. But does that make them unhealthy?
Health: all or nothing?
Perhaps infirmity and disease can coexist with health. This would mean that there is not a binary ‘healthy’ or ‘unhealthy’ state, but rather a spectrum. In our lifetimes, we all experience periods of good and bad health. And we may even experience the two states at the same time.
Huber and colleagues suggest that the problem with the WHO definition is the absoluteness of ‘complete’ wellbeing. This, they suggest, inadvertently contributes to the ‘over-medicalisation’ of the population. It allows a platform for industry, medical technologies and professionals to redefine our health status. In effect, it could imply that no one is ‘healthy’ any of the time, and everyone needs some level of treatment for any given condition. It doesn’t allow the individual to define their own health, and their own health goals.
Recent blogs
Investment in tailored care for adolescents with rare diseases is essential for their health and wellbeing
14 Sep 2021
READ MORE
Lockdown babies and being a first-time parent during the pandemic
26 Aug 2021
READ MORE
Under threat: healthcare in conflict zones
13 Aug 2021
READ MORE
The absoluteness of ‘complete’ wellbeing may inadvertently contribute to the over-medicalisation of the population.
Resilience and management
When the WHO defined health in 1948, it was revolutionary in its notion that health means more than the absence of disease. However, Huber et al. suggest that, owing to our ageing population and the increasing focus on management of communicable diseases, this definition is no longer fit for purpose. They propose shifting the emphasis of health towards the ability to adapt and self-manage in the face of social, physical and emotional challenges.
This echoes the concept of resilience, which has been defined as ‘the capacity for populations to endure, adapt and generate new ways of thinking and functioning in the context of change, uncertainty or adversity’.
Your life, your health
Thanks to medical advances and disease management, the concept of health now encompasses more than traditional definitions encapsulate. There is a level of health that each of us can aspire to attain. Every person is exposed to a unique selection of beneficial and adverse circumstances over the life course. Ultimately, it is how we manage – and adapt to – these circumstances that defines our health status.
Sandra Evans is a former Researcher for The Health Policy Partnership.
The opinions expressed in this blog are those of the author and do not necessarily represent the views of The Health Policy Partnership.
It may seem an obvious question: ‘Do you know what “health” means?’ But there is much debate over the definition.
The World Health Organization (WHO) defines health as ‘a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity’. But how accurate is this? Consider a person who has diabetes and manages it with medication, or someone who has back pain that they manage with physiotherapy. These people are clearly not in a state of complete physical wellbeing. But does that make them unhealthy?
Health: all or nothing?
Perhaps infirmity and disease can coexist with health. This would mean that there is not a binary ‘healthy’ or ‘unhealthy’ state, but rather a spectrum. In our lifetimes, we all experience periods of good and bad health. And we may even experience the two states at the same time.
Huber and colleagues suggest that the problem with the WHO definition is the absoluteness of ‘complete’ wellbeing. This, they suggest, inadvertently contributes to the ‘over-medicalisation’ of the population. It allows a platform for industry, medical technologies and professionals to redefine our health status. In effect, it could imply that no one is ‘healthy’ any of the time, and everyone needs some level of treatment for any given condition. It doesn’t allow the individual to define their own health, and their own health goals.
Recent blogs
Investment in tailored care for adolescents with rare diseases is essential for their health and wellbeing
14 Sep 2021
READ MORE
Lockdown babies and being a first-time parent during the pandemic
26 Aug 2021
READ MORE
Under threat: healthcare in conflict zones
13 Aug 2021
READ MORE
The absoluteness of ‘complete’ wellbeing may inadvertently contribute to the over-medicalisation of the population.
Resilience and management
When the WHO defined health in 1948, it was revolutionary in its notion that health means more than the absence of disease. However, Huber et al. suggest that, owing to our ageing population and the increasing focus on management of communicable diseases, this definition is no longer fit for purpose. They propose shifting the emphasis of health towards the ability to adapt and self-manage in the face of social, physical and emotional challenges.
This echoes the concept of resilience, which has been defined as ‘the capacity for populations to endure, adapt and generate new ways of thinking and functioning in the context of change, uncertainty or adversity’.
Your life, your health
Thanks to medical advances and disease management, the concept of health now encompasses more than traditional definitions encapsulate. There is a level of health that each of us can aspire to attain. Every person is exposed to a unique selection of beneficial and adverse circumstances over the life course. Ultimately, it is how we manage – and adapt to – these circumstances that defines our health status.
Sandra Evans is a former Researcher for The Health Policy Partnership.
The opinions expressed in this blog are those of the author and do not necessarily represent the views of The Health Policy Partnership.
Authored by:
Hubert Blaine Wolfeschlegelsteinhausenbergerdorff Sr.Hube...
Posted on: #iteachmsu
Health Knowledge
We may think we understand what health is, but is there a single, c...
Authored by:
ASSESSING LEARNING
Wednesday, Sep 22, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Cybersecurity and it's Importance
Cyber Security involves the practice of implementing multiple layers of security and protection against digital attacks across computers, devices, systems, and networks. Usually, organizations have a system and a framework in place for how they tackle attempted or successful cyberattacks. A good framework can help detect and identify threats, protect networks and systems, and recover in case any attack was successful.
Importance of Cybersecurity
Cybersecurity is even more significant now as most things that we enjoy today are in the form of connected devices and systems. With IoT revolutionizing the way the world operates, it has become imperative that Cybersecurity be implemented in all systems that are prone to threats and attacks to prevent extortion attempts, identity theft, loss of valuable data, misuse of sensitive information, etc.
Critical infrastructures such as hospitals, financial service companies, power plants, etc. possess sensitive data not only pertaining to their consumers but also to themselves. This calls for serious consideration for Cyber Security implementation to keep our society functioning without disruptions.
Importance of Cybersecurity
Cybersecurity is even more significant now as most things that we enjoy today are in the form of connected devices and systems. With IoT revolutionizing the way the world operates, it has become imperative that Cybersecurity be implemented in all systems that are prone to threats and attacks to prevent extortion attempts, identity theft, loss of valuable data, misuse of sensitive information, etc.
Critical infrastructures such as hospitals, financial service companies, power plants, etc. possess sensitive data not only pertaining to their consumers but also to themselves. This calls for serious consideration for Cyber Security implementation to keep our society functioning without disruptions.
Authored by:
This Student Success playlist was created by members of t...
Posted on: #iteachmsu
Cybersecurity and it's Importance
Cyber Security involves the practice of implementing multiple layer...
Authored by:
ASSESSING LEARNING
Wednesday, Sep 22, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
data science
The programming requirements of data science demands a very versatile yet flexible language which is simple to write the code but can handle highly complex mathematical processing. Python is most suited for such requirements as it has already established itself both as a language for general computing as well as scientific computing. More over it is being continuously upgraded in form of new addition to its plethora of libraries aimed at different programming requirements. Below we will discuss such features of python which makes it the preferred language for data science.
A simple and easy to learn language which achieves result in fewer lines of code than other similar languages like R. Its simplicity also makes it robust to handle complex scenarios with minimal code and much less confusion on the general flow of the program.
It is cross platform, so the same code works in multiple environments without needing any change. That makes it perfect to be used in a multi-environment setup easily.
It executes faster than other similar languages used for data analysis like R and MATLAB.
Its excellent memory management capability, especially garbage collection makes it versatile in gracefully managing very large volume of data transformation, slicing, dicing and visualization.
A simple and easy to learn language which achieves result in fewer lines of code than other similar languages like R. Its simplicity also makes it robust to handle complex scenarios with minimal code and much less confusion on the general flow of the program.
It is cross platform, so the same code works in multiple environments without needing any change. That makes it perfect to be used in a multi-environment setup easily.
It executes faster than other similar languages used for data analysis like R and MATLAB.
Its excellent memory management capability, especially garbage collection makes it versatile in gracefully managing very large volume of data transformation, slicing, dicing and visualization.
Authored by:
monika
Posted on: #iteachmsu
data science
The programming requirements of data science demands a very versati...
Authored by:
ASSESSING LEARNING
Friday, Sep 17, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Neutron capture
It is believed that these heavier elements, and some isotopes of lighter elements, have been produced by successive capture of neutrons. Two processes of neutron capture may be distinguished: the r -process, rapid neutron capture; and the s -process, slow neutron capture. If neutrons are added to a stable nucleus, it is not long before the product nucleus becomes unstable and the neutron is converted into a proton. Outside a nucleus, a neutron decays into a proton and an electron by a process called beta decay (β-decay). Inside a nucleus it can be stable if the nucleus does not contain too many neutrons. In slow neutron capture, neutrons are added at a rate such that whenever an unstable nucleus is formed, it beta-decays before another neutron can be added. If neutrons can be added more rapidly, as in the r -process, the unstable nuclei formed cannot decay before additional neutrons are added until a nucleus is eventually produced that will not accept a further neutron. This nucleus, however, will eventually be subject to beta decay, thus permitting further neutron capture.
Posted by:
Rupali Jagtap
Posted on: #iteachmsu
Neutron capture
It is believed that these heavier elements, and some isotopes of li...
Posted by:
ASSESSING LEARNING
Thursday, Aug 12, 2021
Posted on: #iteachmsu
ASSESSING LEARNING
Thoughtful Classroom Setup and Structure
Without saying a word, classrooms send messages about diversity, relationship building, communication, and the roles of teachers and students. The classroom setup should be student-centered. Specifics will vary from teacher to teacher and class to class, but common elements include the following:
Classroom milieu. Classrooms should be decorated with multicultural images that mirror students’ backgrounds and showcase the diversity of our society.
Arrangement of furniture and supplies. The arrangement will look different depending on age group and subject, but all teachers can draw on these goals when setting up a classroom: supporting collaboration, fostering dialogue, encouraging ownership, and ensuring comfort.
Student roles and responsibilities. Classrooms will be most effective when they are structured to maximize students’ voices and participation.
Classroom norms. Norms and expectations should take into account different cultural and communication styles, gender differences, language needs, and the desire to challenge stereotypes. Students should be involved in setting classroom norms to generate buy-in.
Classroom milieu. Classrooms should be decorated with multicultural images that mirror students’ backgrounds and showcase the diversity of our society.
Arrangement of furniture and supplies. The arrangement will look different depending on age group and subject, but all teachers can draw on these goals when setting up a classroom: supporting collaboration, fostering dialogue, encouraging ownership, and ensuring comfort.
Student roles and responsibilities. Classrooms will be most effective when they are structured to maximize students’ voices and participation.
Classroom norms. Norms and expectations should take into account different cultural and communication styles, gender differences, language needs, and the desire to challenge stereotypes. Students should be involved in setting classroom norms to generate buy-in.
Posted by:
Chathuri Hewapathirana

Posted on: #iteachmsu

Thoughtful Classroom Setup and Structure
Without saying a word, classrooms send messages about diversity, re...
Posted by:
ASSESSING LEARNING
Thursday, Apr 29, 2021